메뉴 건너뛰기




Volumn , Issue , 2009, Pages 575-582

Analysis of signature wrapping attacks and countermeasures

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL SIGNATURE; NEW SOLUTIONS; SIGNATURE VERIFICATION; SOAP MESSAGES; SUBTREES;

EID: 70449469222     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICWS.2009.12     Document Type: Conference Paper
Times cited : (41)

References (20)
  • 5
    • 70349242702 scopus 로고    scopus 로고
    • XML Rewriting Attacks: Existing Solutions and their Limitations.
    • IADIS Press, Apr
    • A. Benameur, F. A. Kadir, and S. Fenet. XML Rewriting Attacks: Existing Solutions and their Limitations. In IADIS Applied Computing 2008. IADIS Press, Apr. 2008.
    • (2008) IADIS Applied Computing 2008.
    • Benameur, A.1    Kadir, F.A.2    Fenet, S.3
  • 16
    • 70349346063 scopus 로고    scopus 로고
    • Web Services Security: SOAP Message Security 1.1 (WS-Security 2004).
    • A. Nadalin, C. Kaler, R. Monzillo, and P. Hallam- Baker. Web Services Security: SOAP Message Security 1.1 (WS-Security 2004). OASIS Standard, 2006.
    • (2006) OASIS Standard
    • Nadalin, A.1    Kaler, C.2    Monzillo, R.3    Baker. P.H.-4
  • 18
    • 70449511744 scopus 로고    scopus 로고
    • An inline approach for secure soap requests and early validation.
    • M. A. Rahaman, R. Marten, and A. Schaad. An inline approach for secure soap requests and early validation. OWASP AppSec Europe, 2006.
    • (2006) OWASP AppSec, Europe
    • Rahaman, M.A.1    Marten, R.2    Schaad., A.3
  • 19
    • 46849100465 scopus 로고    scopus 로고
    • Soap-based secure conversation and collaboration.
    • M. A. Rahaman and A. Schaad. Soap-based secure conversation and collaboration. In ICWS, pages 471-480, 2007.
    • (2007) ICWS , pp. 471-480
    • Rahaman, M.A.1    Schaad., A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.